Technology, Science and Universe
Results for {phrase} ({results_count} of {results_count_total})
Displaying {results_count} results of {results_count_total}
j
- JSP Session Fixation Description: Session fixation in JSP (JavaServer Pages) is a security vulnerability that allows an attacker to hijack a user's session in a web(...) Read more
- JavaScript Remote Code Execution Description: Remote code execution of JavaScript is a critical vulnerability that allows an attacker to execute arbitrary JavaScript code on a(...) Read more
- JavaScript File Inclusion Description: JavaScript file inclusion refers to a vulnerability that allows an attacker to inject and execute malicious JavaScript code within(...) Read more
- JavaScript Cross-Site Request Forgery Description: Cross-Site Request Forgery (CSRF) is a type of attack that tricks a user into executing unwanted actions on a different site than(...) Read more
- JavaScript Clickjacking Description: Clickjacking is a malicious technique that deceives users into clicking on elements of a web page that are not what they appear to(...) Read more
- JavaScript Denial of Service Description: Denial of service in JavaScript refers to a type of cyber attack that aims to make a web application inaccessible to its legitimate(...) Read more
- JavaScript Buffer Overflow Description: Buffer overflow is a security vulnerability that occurs when a program writes more data to a buffer than it can hold. This can lead(...) Read more
- JavaScript Memory Corruption Description: Memory corruption in JavaScript is a vulnerability that occurs when a program incorrectly manages memory, leading to unpredictable(...) Read more
- JavaScript API Vulnerability Description: API vulnerability in JavaScript refers to weaknesses in application programming interfaces (APIs) that can be exploited by(...) Read more
- JavaScript Event Handler Vulnerability Description: A vulnerability in JavaScript event handlers occurs when user-generated events are not properly validated, potentially allowing an(...) Read more
- JavaScript Prototype Pollution Description: Prototype pollution in JavaScript refers to a vulnerability that allows an attacker to modify the prototype of an object, leading(...) Read more
- JavaScript Security Misconfiguration Description: Incorrect security configuration in JavaScript is a vulnerability that arises from inadequate security settings in JavaScript(...) Read more
- Just-in-time Security Description: Just-in-time security refers to the approach of implementing security measures at the moment they are needed, rather than in(...) Read more
- Judicious Security Practices Description: Judicious security practices are thoughtful and careful approaches to implementing security measures, especially in advanced(...) Read more
- Judgment in Security Description: Security judgment refers to the decision-making process involved in risk assessment and security responses. This process is(...) Read more